Skip to content

Commit 8bcb4b8

Browse files
authored
Merge pull request #32078 from github/repo-sync
Repo sync
2 parents 2b5e473 + bffbc5c commit 8bcb4b8

10 files changed

+104
-107
lines changed
64.3 KB
Loading
55.8 KB
Loading

content/code-security/secret-scanning/about-secret-scanning.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -90,13 +90,11 @@ You can also define custom {% data variables.product.prodname_secret_scanning %}
9090

9191
### Accessing {% data variables.secret-scanning.alerts %}
9292

93-
When you enable {% data variables.product.prodname_secret_scanning %} for a repository or push commits to a repository with {% data variables.product.prodname_secret_scanning %} enabled, {% data variables.product.prodname_dotcom %} scans the contents for secrets that match patterns defined by service providers{% ifversion ghes or ghec %} and any custom patterns defined in your enterprise, organization, or repository{% endif %}.
94-
95-
When {% data variables.product.prodname_secret_scanning %} detects a secret, {% data variables.product.prodname_dotcom %} generates an alert.
93+
{% data reusables.secret-scanning.secret-scanning-about-alerts %}
9694

9795
- {% data variables.product.prodname_dotcom %} sends an email alert to the repository administrators and organization owners. You'll receive an alert if you are watching the repository{% ifversion secret-scanning-notification-settings %}, {% else %}, and {% endif %}if you have enabled notifications either for security alerts or for all the activity on the repository{% ifversion secret-scanning-notification-settings %}, and if, in your notification settings, you have selected to receive email notifications for the repositories that you are watching.{% else %}.{% endif %}
9896
- If the person who introduced the secret isn't ignoring the repository, {% data variables.product.prodname_dotcom %} will also send them an email alert. The emails contains a link to the related {% data variables.product.prodname_secret_scanning %} alert. The person who introduced the secret can then view the alert in the repository, and resolve the alert.
99-
- {% data variables.product.prodname_dotcom %} displays an alert in the **Security** tab of the repository.
97+
- {% data reusables.secret-scanning.repository-alert-location %}
10098

10199
For more information about viewing and resolving {% data variables.secret-scanning.alerts %}, see "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning)."
102100

content/code-security/secret-scanning/about-the-detection-of-generic-secrets-with-secret-scanning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The system scans for passwords using the LLM. No additional data is collected by
3636

3737
The LLM scans for strings that resemble passwords and verifies that the identified strings included in the response actually exist in the input.
3838

39-
These detected strings are surfaced as alerts on the {% data variables.product.prodname_secret_scanning %} alerts page, but they are displayed in an additional list that is separate from regular {% data variables.secret-scanning.alerts %}. The intent is that this separate list is triaged with more scrutiny to verify the validity of the findings. Each alert notes that it was detected using AI. {% ifversion secret-scanning-ai-generic-secret-detection %}For information on how to view alerts for generic secrets, see "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning#viewing-alerts-for-generic-secrets-detected-using-ai)."{% endif %}
39+
These detected strings are surfaced as alerts on the {% data variables.product.prodname_secret_scanning %} alerts page, but they are displayed in an additional list that is separate from regular {% data variables.secret-scanning.alerts %}. The intent is that this separate list is triaged with more scrutiny to verify the validity of the findings. Each alert notes that it was detected using AI. {% ifversion secret-scanning-ai-generic-secret-detection %}For information on how to view alerts for generic secrets, see "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning)."{% endif %}
4040

4141
## Improving the performance of generic secret detection
4242

@@ -75,7 +75,7 @@ Generic secret detection has been subject to Responsible AI Red Teaming and {% d
7575
## Next steps
7676

7777
- [AUTOTITLE](/code-security/secret-scanning/enabling-ai-powered-generic-secret-detection)
78-
- [AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning#viewing-alerts-for-generic-secrets-detected-using-ai)
78+
- [AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning)
7979

8080
{% endif %}
8181

content/code-security/secret-scanning/configuring-secret-scanning-for-your-repositories.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ You can enable the following additional {% data variables.product.prodname_secre
6565
{% data reusables.secret-scanning.validity-check-partner-patterns-beta %}
6666
{% data reusables.gated-features.partner-pattern-validity-check-ghas %}
6767

68-
You can allow {% data variables.product.prodname_secret_scanning %} to automatically check the validity of a secret found in your repository by sending it to the relevant partner. For more information on validity checks, see "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning#validating-partner-patterns)."
68+
You can allow {% data variables.product.prodname_secret_scanning %} to automatically check the validity of a secret found in your repository by sending it to the relevant partner. For more information on validity checks, see "Checking a secret's validity" in "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning#checking-a-secrets-validity)."
6969

7070
{% note %}
7171

content/code-security/secret-scanning/enabling-ai-powered-generic-secret-detection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You can then enable the feature in the "Code security and analysis" settings pag
2525
{% data reusables.repositories.navigate-to-ghas-settings %}
2626
1. Under "Secret scanning", select the checkbox next to "Use AI detection to find additional secrets".
2727

28-
For information on how to view alerts for generic secrets that have been detected using AI, see "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning#viewing-alerts-for-generic-secrets-detected-using-ai)."
28+
For information on how to view alerts for generic secrets that have been detected using AI, see "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning)."
2929

3030
## Further reading
3131

0 commit comments

Comments
 (0)